Re: Prey and Hidden tracking stolen Mac computers
People who get used computer, either stolen or just bought second hand seldom wipe the HD. Usually there's applications they want to keep or they're just lazy. On Jun 1, 2:00 pm, Jonas Lopez wrote: > Prey and Hidden tracking stolen Mac computers > > What is to prevent the wipe of the hd and a new install to defeat these > needed applications? > > JML -- You received this message because you are a member of G-Group, a group for those using G3, G4, and G5 desktop Macs - with a particular focus on Power Macs. The list FAQ is at http://lowendmac.com/lists/g-list.shtml and our netiquette guide is at http://www.lowendmac.com/lists/netiquette.shtml To post to this group, send email to g3-5-list@googlegroups.com For more options, visit this group at http://groups.google.com/group/g3-5-list
Re: Prey and Hidden tracking stolen Mac computers
On Jun 1, 2011, at 2:00 PM, Jonas Lopez wrote: > Prey and Hidden tracking stolen Mac computers > > What is to prevent the wipe of the hd and a new install to defeat these > needed applications? Absolutely nothing. That said...criminals tend to be really stupid. Hollyweird has warped our senses with this stuff, but in the main folks stealing computers in B&E's are generally drug addicts selling their loot to other drug addicts for drug money. You would be surprised how dumb they can be. I knew someone who did a 5-year stretch for holding up the burger joint he worked at. He was careful to wear a mask over his face; sadly they figured out pretty quickly who it was when he get off his shift and walked in 10 minutes later (in the clothes he just left in) and said "this is a stick up. Give me all the money." Definitely a few bricks short of a load, that one. So the software's definitely better than nothing. -- Bruce Johnson University of Arizona College of Pharmacy Information Technology Group Institutions do not have opinions, merely customs -- You received this message because you are a member of G-Group, a group for those using G3, G4, and G5 desktop Macs - with a particular focus on Power Macs. The list FAQ is at http://lowendmac.com/lists/g-list.shtml and our netiquette guide is at http://www.lowendmac.com/lists/netiquette.shtml To post to this group, send email to g3-5-list@googlegroups.com For more options, visit this group at http://groups.google.com/group/g3-5-list
Prey and Hidden tracking stolen Mac computers
Prey and Hidden tracking stolen Mac computers What is to prevent the wipe of the hd and a new install to defeat these needed applications? JML -- You received this message because you are a member of G-Group, a group for those using G3, G4, and G5 desktop Macs - with a particular focus on Power Macs. The list FAQ is at http://lowendmac.com/lists/g-list.shtml and our netiquette guide is at http://www.lowendmac.com/lists/netiquette.shtml To post to this group, send email to g3-5-list@googlegroups.com For more options, visit this group at http://groups.google.com/group/g3-5-list